Affiliation:
1. Russian State Hydrometeorological University
Abstract
The complexity of ensuring the availability of geoinformation systems resources is due to the volatile structure of the system, the uncertainty of user tasks and destructive influences. This paper proposes methods that allow to halve the probability of information security risk associated with the disruption of resource availability. The effect is achieved by: 1) preserving the required probability of achieving the activity goal of the identification system, regardless of the strength of disruptive influences; 2) by aggregating the performance of individual physical system elements into virtual pools; and 3) by converting internal user task reserves into performance reserves. The performance of the methods was evaluated using a simulation model developed in MATLAB environment.
Publisher
Bonch-Bruevich State University of Telecommunications
Reference37 articles.
1. Voronin A.V., Zatsarinny A.A. Geoinformation system as the most important component of management decision making system. Sistemy vysokoy dostupnosti. 2019;15(3):27−33. (in Russ.) DOI:10.18127/j20729472-201903-02
2. Lisitsky D.V., Katsko S.Yu. User segment of unified territorial geoinformation environment. Vestnik of SSUGT. 2016;4(36):89‒99 (in Russ.)
3. Gryzunov V.V. Conceptual model of geoinformation system adaptive control under conditions of destabilization. Information Security Problems. Computer Systems. 2021;1:102‒108. (in Russ.)
4. Gryzunov V., Grishechko A., Sipovich D. Selecting the most dangerous vulnerabilities for prospective information systems for critical applications. Voprosy kiberbezopasnosti. 2022;1(47):66‒75. (in Russ.) DOI:10.21681/2311-3456-2022-1-66-75
5. Danilin G.V., Sokolov S.S., Nyrkov A.P., Knysh T.P. Multiservice networks: methods of increasing data security in the conditions of network attacks. XXI Century: Resumes of the Past and Challenges of the Present plus. 2020;9(2-50):158‒163. (in Russ.) DOI:10.46548/21vek-2020-0950-0028
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IDENTIFICATION OF INFORMATION SECURITY PROBLEMS BY A SYSTEMATIC LITERATURE REVIEW;Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»;2024-04-13